Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe
-
Size
275KB
-
MD5
e2d7acd67f9ee3d5674971cf60acd7d7
-
SHA1
709e59da1e0de8d078173458de1c5b543701fbd8
-
SHA256
eb4bf8c7a95b40686ea4b7e70af3e6b4668b06f8ef112808a040caa82c2b2b63
-
SHA512
a7844bbea6dcb1d37bf422cdebb97d814b7e48ff85a445498c0bfedd15c5b54de55c6adde74f8b70507056633fd7187a2ed580222df16bdbbd3f1703437a4ef4
-
SSDEEP
6144:/DRYFav6UKLqmHP1cuuDmIsB0p3xzMw4H4GZ28pgGAz0FgnXN:ch2lmE3pxVkgGzC
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2184 49DC.tmp -
Loads dropped DLL 2 IoCs
pid Process 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2348-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2348-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2936-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2348-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2936-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2348-114-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/752-116-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/752-117-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2348-287-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2348-293-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\D5E.exe = "C:\\Program Files (x86)\\LP\\3275\\D5E.exe" e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\3275\D5E.exe e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3275\49DC.tmp e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3275\D5E.exe e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49DC.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2228 msiexec.exe Token: SeTakeOwnershipPrivilege 2228 msiexec.exe Token: SeSecurityPrivilege 2228 msiexec.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe Token: SeShutdownPrivilege 1736 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe 1736 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2936 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2936 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2936 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 32 PID 2348 wrote to memory of 2936 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 32 PID 2348 wrote to memory of 752 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 34 PID 2348 wrote to memory of 752 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 34 PID 2348 wrote to memory of 752 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 34 PID 2348 wrote to memory of 752 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 34 PID 2348 wrote to memory of 2184 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 37 PID 2348 wrote to memory of 2184 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 37 PID 2348 wrote to memory of 2184 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 37 PID 2348 wrote to memory of 2184 2348 e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\5FFA7\49232.exe%C:\Users\Admin\AppData\Roaming\5FFA72⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2d7acd67f9ee3d5674971cf60acd7d7_JaffaCakes118.exe startC:\Program Files (x86)\A7754\lvvm.exe%C:\Program Files (x86)\A77542⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Program Files (x86)\LP\3275\49DC.tmp"C:\Program Files (x86)\LP\3275\49DC.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c790645bc36e6f5cd401ea7c4be5f805
SHA1332c03f8b352d7d587e1ad296cf150af127a3999
SHA2560b78d03972f9446cf7a03c01a59793cb644a6038563e061615222397e7075f90
SHA5125793e2b0c0f97d84222abb802c0be668835f634cab3745290253d0d962e45275b57b47dd3b65231a72adaa63f09f83dc976b7b8b216dc22e0b32d9934be9e215
-
Filesize
600B
MD544711d407baaa4437639ad4d0aa9f96f
SHA131f11f4d1cb2ba39dfac88e4b53b9103df976c2c
SHA2566ea6e75f4d477dac3c62d721d9338cd7a45407fd7736c2c78a724b03651c8d08
SHA5121342e9f936a00aee8a595e8c120d07c19eb6c26a28e647f7f7f1e71c6b146dd21841731530ec1bb7e67bc70c31faa1440def92611ae02a72fda7c3e266644f3e
-
Filesize
1KB
MD58a454a3d609c6b831ea5c3f412b68e20
SHA1b64aca02f1b000178cbe116fd450a4dc9265b322
SHA2564726654ed542bb79fe90f80dc17252fea1dc66a6296e42579089ece3fa6c9aed
SHA5126912140dc80707844e6bf5f0b5d2cbe0237b527c07584027c3c4bddca909689ebba27fde305515ac7a5ee28061d735b5689cc1da1a37bc6b2695603736a30de9
-
Filesize
96KB
MD5961cd443acc6e85b8270338e07219d7c
SHA1583b803c1b7c9a0e38ffc9e92a72329efe27f0d5
SHA256425a4ff41ea2822321edf7ba05ff7677cad1056749c4b60e52c42f399e10e0b8
SHA5126d80acadd9791cc908e357a70a593dddfe08da2a975627e15a518d278175a13808af0805ed27fdffa6e937882bb51a75105a77bfdd7982045f6c18cbb20bc7ba